Fixed: When managing with ESET Remote Administrator, despite a locked item in a policy distributed by ESET Remote Administrator, you can still disable certain protection modules using GUI or eShell (including Anti-Stealth, Anti-Phishing and Document protection, which includes Automatic exclusions switch)

Version 6.2.12007.0 (compared to 6.0.12035.0 released on March 31, 2015)

Added: Hyper-V storage scan allows inspection of virtual machines (both turned off and running) hosted by the server with enabled Hyper-V role NOTE: A scan of running VMs is possible only on Microsoft Windows Server 2012 and newer

Improved: Settings synchronization across cluster nodes works properly even if centrally managed by ESET Remote Administrator

Fixed: License synchronization issue between cluster nodes does not work correctly

Fixed: Configuration for suppressing specific status messages in ESET Graphical User Interface (eGUI) does not work for eShell (suppressed notifications are always displayed in eShell)

Fixed: If the ESET product has been activated using License Key or Security Admin account, and then Offline file is used for re-activation, subsequent re-activation with the License Key or Security Admin account is not possible

Fixed: Despite a central policy from ESET Remote Administrator with settings lock in place, users with administrative rights can revert product settings to default values locally and thereby override the policy up to the point of the next policy sync with ERA

Version 6.0.12035.0 (compared to 6.0.12032.0)

Fixed: GUI crash on workstations if the system CPU does not support SSE/SSE2 instruction set

Fixed: During upgrade procedure from regularly activated version 4.5.12017.0, the product will revert to non-activated state

Fixed: Program kernel CPU usage of one processor core peaks at 100% when warnings log-file exceeds hundreds of thousands lines and the server is managed by ESET Remote administrator with active local agent software